Cybersecurity Advisory for Spring4Shell & Spring Cloud
Spring4Shell: This new vulnerability was released as a Proof-of-Concept by AntGroup FG Security Lab on March 29, 2022, and it was found to lead to a...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
On March 22, 2022, the Lapsus$ threat group (aka DEV-0537), who recently gained notoriety for compromises including Microsoft, Samsung, Nvidia, and others, announced that they had compromised Identity Access Management (IAM) platform, Okta. Further, Lapsus$ claims to have gained access to client environments and sensitive information via their access to Okta. Lapsus$ representatives posted screenshots that seemed to suggest access to sensitive information, including sensitive information for Cloudflare users.
Okta initially claimed that the compromise, which occurred between 16-21 January, was limited in scope to the access of Okta support engineers. Okta indicates that while support engineers can assist users with password changes they cannot obtain those passwords, cannot create or delete users, and cannot download customer databases. Okta later indicated that 2.5% of their customers may have been impacted and had data viewed or acted upon. It isn’t clear at this point what type of data may have been seen or what type of actions may have been taken. However, Okta indicates that they have already reached out to these potentially impacted clients directly by email. Cloudflare’s investigation concluded that a compromise had not occurred within their environment Nevertheless, Cloudflare's recommendations are worth considering for organizations who use Okta as an IAM.
Cloudflare recommends the following actions:
As an additional precaution Ingalls encourages organizations who use Okta to also consider these additional recommendations:
Ingalls is dedicated to protecting your network and your information by providing defense-in-depth security through your Managed Detection & Response (MDR) service. As an added layer of defense, Ingalls now offers monitoring and support by a team of live Security Analysts in our Security Operations Center (SOC) 24 hours a day, every day of the year. ‘Round the clock, MDR provides extended coverage with continuous analysis, response and escalation so you can have the peace of mind that comes from knowing your network is being monitored in real-time even if your business hours have stopped. Please contact us for more information.
Spring4Shell: This new vulnerability was released as a Proof-of-Concept by AntGroup FG Security Lab on March 29, 2022, and it was found to lead to a...
VMWare refers to these two vulnerabilities collectively as VMSA-2021-0010. CVE-2021-21985 - The vSphere Client (HTML5) contains a remote code...
It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and...